Advanced Materials Research Vols. 403-408

Paper Title Page

Abstract: Interaction, sharing, and connection are at the heart of Web 2.0, giving rise to innovative online media usage and the concept social networking that have transformed not only the network behavior of the masses, but also the form of online learning. In college English learning courses, Web 2.0 provides real-time and easily-accessible online resources for students to search for the information they need, granting them more autonomy in the English learning process. Meanwhile, Web 2.0-based network tools and video-sharing platform, such as Wikipedia and podcasts, provide a user-oriented and user-centered mechanism that allows personal creation, cooperative creation, interactive social networking, and peer-to-peer mutual learning, as an extension to the scope of autonomous English learning. In addition, with the rising popularity of Web 2.0-inspired social networking sites like Facebook, Twitter and blogs, the concept of social networking should also be increasingly incorporated into language education, since it promotes online interactions among English learners, while facilitating the establishment of information sharing, data query, and learning partnership in the network learning community. Thus, this project exploits Web 2.0-based online learning as the framework to design freshman English materials fusing social learning elements, for the purpose of boosting students’ interests for enhanced learning effectiveness, expanding e-learning into s-learning.
1240
Abstract: This present study combines augmented reality and interactive multimedia for the construction of a learning system that offers educational knowledge on butterfly metamorphosis, as we call it ARButterfly. The main purpose of designing this learning platform is to apply AR technology to produce innovative interactive learning models that are both fun and educational, creating an enriched learning experience through multimedia. With this platform, learners control the AR markers and are presented with life-like 3D objects to learn about the life cycle of butterflies. In addition, learners are given the opportunity to further observe the ecological interactions between butterflies and flowers or plants in this virtual setting. Our findings show the platform is capable of boosting students’ learning interests and improving their learning effectiveness.
1244
Abstract: Statistical hypothesis test is an important data analysis theory that has found applications in various research fields. It provides a theoretical foundation to determine whether sufficient evidence exists to reject hypothesis for the trial using experimental results, in order to make a decision. In this paper, we address one of the fundamental test theories: the Nonparametric Sign Test, under the privacy-preserving context. In this context, two parties, Alice and Bob, would like to perform a sign test on their joint dataset, but neither of them is willing to disclose their private raw data to the other party. More specifically, this paper addresses the problem where the joint dataset consists of two vertically partitioned datasets. Our previous work [14] has addressed this problem using data perturbation techniques. However, in a case when the privacy of individual data objects and data subjects are of high concern, using data perturbation techniques may not be sufficient. This paper proposes an alternative solution to this problem by employing an additive homomorphic encryption scheme and an on-line STTP. We show that this solution can offer better privacy preservation, in terms of individual data confidentiality and individual privacy, than the previous solution. A security comparison with TTPV and P22NSTV solutions is also presented.
1249
Abstract: Shot boundary detection is the first step of the video processing. Based on the summary of the existing methods of shot boundary detection, this paper put forward an adaptive dual threshold algorithm which adjusts automatically the threshold along with the changes of the content of shots. Color histogram of weighted non-uniform blocks is taken as characteristic to calculate differences of frames in the algorithm, which considers not only the global information of the image, but also the local information. The second detection is carried on when the boundaries are detected initially reduces effectively error rate that caused by flashlight. Finally, the algorithm is proved effective.
1258
Abstract: This article is based on the ordinary ABC classification, uses the improved ABC classification to classify the company’s equipment and spare parts, and combine the results of those classifications to give the final conclusion. This classification is much better than the ordinary one, for it considers more important facts affecting manufacturing. This article uses Fuzzy Evaluation Analysis to classify its unique spare parts, and establishes the excess spare parts model to decrease quantities of the spare parts and therefore save the fluid funds of the company.
1262
Abstract: The traditional agent intelligence designing always lead to a fixed behavior manner. In this way, the NPC(Non-Player Character) in the game will act in a fixed and expectable way. It has greatly weakened the long-term attraction of single-played game. Extracting the human action patterns using a statistical-based machine learning algorithm can provide an easily-understanding way to implement the agent behavior intelligence. A daemon program records and sample the human player’s input action and related properties of character and virtual environment, and then apply certain statistical-based machine learning algorithm on the sample data. As a result, a human-similar intelligent behavior model was obtained. It can be used to help agent making an action decision. Repeating the learning process can give the agent a variety of intelligent behavior.
1266
Abstract: The paper introduces the design objective and design scheme of mobile agent-based X.509 certificate management system, and describes the key technologies such as encryption, the certificate processing format and coding, secure communication protocols such as SSL in detaile.
1270
Abstract: In this paper, the design scheme for the retail distribution center management system is proposed and analysis of the key technology is given. The systems involve procurement, inspection, storage, repacking, distribution, scheduling, return goods, and other functions. The key technologies for role access control, storage process and workflow are adopted, which ensure the goods supply of the retail enterprise shop, reduce the supply of goods transport costs, and improve the competitiveness of enterprises.
1274
Abstract: According to the development of the Internet of things, a wireless cognitive transducer based on humidity-sensitive capacitor was designed. The ambient temperature and humidity are measured by temperature &humidity transducer which transfers the capacity into frequency signal with the help of RC oscillation, followed by the frequency with MSP430 SCM and the humidity accordingly. Thermal sensitive resister of the negative temperature system is used to measure the temperature. When measuring, the humidity can be compensated by temperature data, thus ensuring higher precision and stability of humidity measuring. The measured data are sent out by NRF24L01 through communication protocol to accomplish distant data collection of temperature and humidity, which foretells a bright prospect.
1277
Abstract: To speed up the image acquisition and make full use of effective information, a design method of CCD partial image scanning system is presented. The system achieves to functions of the high -speed data collection, the high -speed video data compression the real time video data Network Transmission and the real time compression picture data storage. the data processed was transferred to PC through USB2.0 real-time to reconstruct defects microscopic images. Experiments show that the system has stable performance, real-time data transmission and high quality images, feasible by adopting the algorithm and scheme proposed in this paper.
1281

Showing 211 to 220 of 984 Paper Titles